Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24947 | The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files. |
Solution
Keysight recommends users update N6854A and N6841A RF to v2.4.0 or later. Keysight also recommends users take the following actions to help reduce risk: Block incoming connection on TCP port number defined by environment variable KEYSIGHT_SMS_PORT (default: 8080)
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-146-01 |
|
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:17:33.446Z
Reserved: 2022-05-10T00:00:00.000Z
Link: CVE-2022-1661
Updated: 2024-08-03T00:10:03.767Z
Status : Modified
Published: 2022-06-02T14:15:33.070
Modified: 2024-11-21T06:41:12.107
Link: CVE-2022-1661
No data.
OpenCVE Enrichment
No data.
EUVD